Mainframes - The Past Will Come Back to Haunt You
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the hidden world of mainframe security in this Black Hat USA 2013 conference talk. Delve into the often-overlooked realm of mainframe systems that power critical infrastructure across governments, military, airlines, and banks. Uncover the security implications of these powerful machines, addressing the knowledge gap between IT security professionals and mainframe experts. Learn about mainframe security implementation, including configuration file locations, access methods, networking commands, and file structures. Gain insights into TSO, JCL, REXX, and other mainframe-specific technologies. Discover how to navigate the mainframe environment, understand resource access control, and explore potential vulnerabilities. Examine topics such as password hashes, FTP servers, and low-level capabilities. Investigate tools and techniques for mainframe security testing, including Nessus and Metasploit. Consider the implications of running Linux on mainframes and methods for searching sensitive data. Bridge the gap between modern IT security practices and the enduring world of mainframe computing in this comprehensive exploration of a often-misunderstood technology landscape.
Syllabus
Disclaimer
Mainframe Legacy
Phil Her
The Big Thing
IBM Matrix
TSO
Executors Care
Interactive System
Datasets
The Next Life
Unit Environment
JCL
REX
Master Console
FTP Server
Bash Script
JCL File
Resource Access Control
Password hashes
Binary
Algorithm
Low Level Cap
I Series Testing
Nessus
The Devil
Another World Alone
psychotic
NCR
iPad Pastures
Not an Idea
Surfactant
Password sniffing
Andersonin
One Count
MTP
Secret Tool
FTP
Java
I am
MainTV
interpreterlife
Mainframe at Home
Hercules
System
Internet Census
Metasploit
Linux on mainframes
Searching for sensitive data
Conclusion
Taught by
Black Hat
Related Courses
Fundamentos de Ciberseguridad: un enfoque prácticoInter-American Development Bank via edX The Complete Penetration Testing Bootcamp
Udemy Don's Introduction to Ethical Hacking for Beginners
Udemy Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy Practice Your First Penetration Test: Kali & Metasploit Lab
Udemy